期刊文献+

基于跳数差的无线传感器网络安全定位方法 被引量:5

Hop difference based secure localization scheme for wireless sensor network
下载PDF
导出
摘要 针对无线传感器网络(WSN)中女巫攻击使距离矢量跳数(DV-HOP)等算法的定位结果产生偏差的问题,提出基于跳数差值的距离矢量跳数算法(HDDV-HOP)及其增强型算法(EHDDV-HOP)。首先,检测节点通过可控泛洪方式获取其他节点的邻居节点列表;其次,检测节点通过分析邻居节点列表检测虚假节点并建立白名单;最后,节点根据白名单选择性转发接收到的数据包并进行安全定位。两种算法的区别在于它们使用不同的检测方式,HDDVHOP算法中检测节点分析邻居节点列表是否相同,而EHDDV-HOP算法中检测节点分析邻居节点列表交集与并集中元素个数之比。仿真结果表明,在信标节点比例达到20%和信号覆盖不对称时,与无女巫攻击时DV-HOP算法相比,HDDV-HOP定位误差相对大133.4%,EHDDV-HOP在相似度阈值合适时只高出7.3%,但都低于有女巫攻击时DVHOP的定位误差。两种算法都能抵御女巫攻击,但EHDDV-HOP更优。 To deal with the problem that the localization result of Distance Vector-Hop( DV-HOP) may be rendered far from precision by the Sybil attack in Wireless Sensor Network( WSN),two hop difference based secure localization algorithms,namely HDDV-HOP and EHDDV-HOP,were proposed. Firstly,neighbor node lists of other nodes were got by the detection nodes through the controlled flooding mechanism. Secondly,the neighbor node lists were analyzed to detect fake nodes and white node lists were established. Finally,packets were selectively relayed based on white node lists and the unknown nodes were securely localized. The two algorithms differ in the techniques they used to detect fake nodes. In HDDVHOP,whether or not neighbor node lists were the same was checked; while in EHDDV-HOP,the ratio of the amount of elements in the intersection of two neighbor node lists to that of elements in the union of the two was analyzed. The simulation results show that,compared with DV-HOP without the Sybil attack,when the ratio of beacon nodes to normal nodes reaches20% and signal coverage is asymmetric,the localization error of HDDV-HOP is increased by 133. 4%,while the error of EHDDV-HOP is increased by 7. 3% when the similarity threshold is suitable,but the localization errors of the both algorithms are smaller than that of DV-HOP with the Sybil attack. Both of HDDV-HOP and EHDDV-HOP can defend against the Sybil attack,however EHDDV-HOP outperforms HDDV-HOP.
出处 《计算机应用》 CSCD 北大核心 2016年第4期945-951,共7页 journal of Computer Applications
基金 国家自然科学基金资助项目(61401106) 广东省自然科学基金资助项目(S2013040013643) 广东省实施技术标准战略专项(15ZK0016) 广州市科学研究专项(2014J4100206) 广东工业大学博士启动基金资助项目(113021)~~
关键词 无线传感器网络 定位 女巫攻击 距离矢量跳数算法 跳数差 Wireless Sensor Network(WSN) localization Sybil attack Distance Vector-Hop(DV-HOP) hop difference
  • 相关文献

参考文献17

  • 1AKYILDIZ F,SU W,SANKARASUBRAMANIAM Y,et al.Wireless sensor networks:a survey[J].Computer Networks,2002,38(4):393-422.
  • 2CAPKUN S,HUBAUX J P.Secure positioning in wireless networks[J].IEEE Journal on Selected Areas in Communications,2006,24(2):221-232.
  • 3BOUKERCHE A,OLIVEIRA H A B,NAKAMURA E F,et al.Secure localization algorithms for wireless sensor networks[J].IEEE Communications Magazine,2008,46(4):96-101.
  • 4GOYAL S,BHATIA T,VERMA A K.Wormhole and Sybil attack in WSN:a review[C]//Proceedings of the IEEE 2nd International Conference on Computing for Sustainable Global Development.Piscataway,NJ:IEEE,2015:1463-1468.
  • 5KARLOF C,WAGNER D.Secure routing in wireless sensor networks:attacks and countermeasures[J].Ad Hoc Networks,2003,1(3):293-315.
  • 6VAMSI P R,KANT K.A lightweight Sybil attack detection framework for wireless sensor networks[C]//Proceedings of the IEEE Seventh International Conference on Contemporary Computing.Piscataway,NJ:IEEE,2014:387-393.
  • 7SARIGIANNIDIS P,KARAPISTOLI E,ECONOMIDES A A.Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information[J].Expert Systems with Applications,2015,42(21):7560-7572.
  • 8BULUSU N,HEIDEMANN J,ESTRIN D.GPS-less low cost outdoor localization for very small devices[J].IEEE Personal Communications,2000,7(5):28-34.
  • 9YU Y,LI K,ZHOU W,et al.Trust mechanisms in wireless sensor networks:attack analysis and countermeasures[J].Journal of Network and Computer Applications,2012,35(3):867-880.
  • 10LAZOS L,POOVENDRAN R.HiRLoc:high-resolution robust localization for wireless sensor networks[J].IEEE Journal on Selected Areas in Communications,2006,24(2):233-246.

二级参考文献35

  • 1王福豹,史龙,任丰原.无线传感器网络中的自身定位系统和算法[J].软件学报,2005,16(5):857-868. 被引量:671
  • 2HE T, HUANG C D, BLUM B M, et al. Range-free localization schemes in large scale sensor networks[ C]//Proceedings of the 9th Annum International Conference on Mobile Computing and Networking. San Diego: ACM Press, 2003:81-95.
  • 3PRIYANTHA N B, CHAKRABORTHY A, BALAKRISHNAN H. The cricket location-support system[ C]// Proceedings of International Conference on Mobile Computing Networking. New York: ACM, 2000:32-43.
  • 4SAVVIDES A, HAN C C, SRIVASTAVA M B. Dynamic fine - grained localization in Ad-Hoc networks of sensors [ C]// Proceedings of 7th Annual International Conference on Mobile Computing and Networking. New York: ACM, 2001:166 - 179.
  • 5CHEN HONG-YANG, SEZAKI K, DENG PING, et al. An improvement DV-HOP algorithm for wireless sensor networks [ EB/ OL]. [2009 -06 -01]. http://www, ee. cityu, edu. hk/- hcso/ iciea08, pdf.
  • 6CHAN Y T, HO K C. A simple and efficient estimator for hyperbolic location[ J]. IEEE Transactions on Signal Processing, 1994, 42 (8): 1905-1915.
  • 7Douceur J. The Sybil Attack[ C]//Proceedings of Internation- al Workshop on Peer - To - Peer Systems. Cambridge: Springer, 2002: 251 - 260.
  • 8Levine B N, Rwiter M K, Wang C. Timing attacks in low- latency mix - based systems[ C]//Proceedings of the 8th In- ternational Conference on Financial Cryptography. Key West: Springer, 2004: 251 - 265.
  • 9Haifeng Yu, Michael Kaminsky, Phillip B Gibbons. Sybil- Guard: Defending Against Sybil Attacks via Social Networks [C]//Proceedings of the ACM SIGCOMM Conference on Computer Communications. Pisa: ACM, 2006: 267 - 278.
  • 10Demirbas M, Song Y. An RSSI - based Scheme for Sybil At- tack Detection in Wireless Sensor Networks[CJ//Proceedings of 2006 International Symposium on Wireless, Mobile and Multimedia Networks. Buffalo: IEEE, 2006:564 - 570.

共引文献69

同被引文献38

引证文献5

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部